Enterprise-grade security, privacy and control

Regardless of the sensitive content, and the location of its processing, your data is our top priority.

Rely on Speechmatics to keep your data secure and fulfill your compliance requirements.

Uncompromised, enterprise-level security

Industry-leading security tools and controls, built for privacy-critical use cases.

ISO 27001

Privacy and compliance built in with our ISO/IEC 27001:2022 accreditation.

GDPR

Compliant with privacy and compliance directives such as the GDPR.

HIPAA

Fully compliant with the Health Insurance Portability and Accountability Act (HIPAA).

SOC 2 Type II

Trusted where privacy matters most - SOC 2 Type II-certified.

Speechmatics is trusted by companies around the world in all shapes and sizes

Case study
AI Media | Case study
Delivering 120X more with voice AI
Powering live content through AI-powered transcription, built on industry-leading voice AI
Case study
Prosodica | Case study
Driving better conversations at scale
Leveraging speech recognition to track customer interactions, highlight key insights, and raise contact center performance

Data sovereignty to satisfy your compliance

Speechmatics have data processing environments located globally to allow you to meet compliance, regulatory, and sovereignty obligations.

Protecting your data is our top priority

Cloud Security

Our cloud infrastructure is hosted on Azure, which includes built-in security services that provide threat protection and unrestricted cloud scalability.

Safeguarding Data

Data is encrypted at rest using AES 256 and in transit using TLS 1.2 or higher, employing a top-tier Security Incident and Event Monitoring (SIEM) solution.

On-Prem Security

Speechmatics services run primarily as Kubernetes-controlled containers, with robust policies and standards governing infrastructure management.

Protection & Privacy

Our privacy standards and policies ensure that data is correctly stored and processed. We will never share customer data with any unauthorized third party.

Security Operations

We partner with specialist organizations (such as Kroll) to provide you with enhanced security operations and monitoring programs.

Penetration Testing

Contracting with industry-leading penetration CREST accredited testing providers to examine our production architecture.

Want to know more about our enterprise-grade security?

Protecting your data is our top priority. Reach out to our team at any time to find out more.